View | Details | Raw Unified | Return to bug 2385
Collapse All | Expand All

(-)a/ssh.1 (-1 / +34 lines)
Lines 710-715 umac-64, umac-128, hmac-ripemd160). Link Here
710
Protocol 1 lacks a strong mechanism for ensuring the
710
Protocol 1 lacks a strong mechanism for ensuring the
711
integrity of the connection.
711
integrity of the connection.
712
.Pp
712
.Pp
713
User to authenticate as on remote server is determined based on these priorities:
714
.Bl -enum -compact
715
.It
716
.Cm user
717
specified before
718
.Cm @
719
character in
720
.Cm hostname
721
string
722
.It
723
.Cm login_name
724
specified using
725
.Cm -l
726
switch
727
.It
728
.Cm User
729
option provided as a parametr to
730
.Cm -o
731
switch
732
.It
733
.Cm User
734
option in matching
735
.Cm Host
736
block from per-user config
737
.Cm ~/.ssh/config
738
.It
739
.Cm User
740
option in matching
741
.Cm Host
742
block from systemwide config
743
.Cm /etc/ssh/ssh_config
744
.El
745
If there is nothing from above specified, username on local terminal is used.
746
.Pp
713
The methods available for authentication are:
747
The methods available for authentication are:
714
GSSAPI-based authentication,
748
GSSAPI-based authentication,
715
host-based authentication,
749
host-based authentication,
716
- 

Return to bug 2385